Send Emails with Resend Security & Risk Analysis

wordpress.org/plugins/send-emails-with-resend

Resend for WordPress integrates the Resend.com API, replacing PHPMailer to ensure reliable email delivery through Resend.com's robust service.

400 active installs v1.3.0 PHP 8.1+ WP 6.0.0+ Updated Mar 9, 2026
apiemailresendsmtp
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Send Emails with Resend Safe to Use in 2026?

Generally Safe

Score 100/100

Send Emails with Resend has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 25d ago
Risk Assessment

The "send-emails-with-resend" v1.3.0 plugin exhibits a generally strong security posture, largely due to a negligible attack surface and responsible handling of sensitive operations like SQL queries. The absence of known vulnerabilities in its history is a significant positive indicator. However, the presence of dangerous functions like `proc_open` and `shell_exec` warrants caution. While the static analysis doesn't reveal any direct exploitation paths for these functions in the current version, their mere presence suggests a potential for misuse if the code evolves or if external inputs were to be improperly handled in the future. The output escaping is good but not perfect, with 20% of outputs potentially not being properly escaped, which could lead to XSS vulnerabilities in specific scenarios. The plugin's limited external dependencies and focus on internal operations also contribute to its relative security, but the aforementioned dangerous functions remain the primary area of concern.

Key Concerns

  • Dangerous functions: proc_open, shell_exec found
  • Potential unescaped output (20% of outputs)
Vulnerabilities
None known

Send Emails with Resend Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Send Emails with Resend Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
3
12 escaped
Nonce Checks
1
Capability Checks
1
File Operations
23
External Requests
1
Bundled Libraries
2

Dangerous Functions Found

proc_open$this->process = proc_open($this->command, static::DESCRIPTOR_SPEC, $this->pipes, $this->cwd);vendor-prefixed\monolog\monolog\src\Monolog\Handler\ProcessHandler.php:115
shell_exec$branches = shell_exec('git branch -v --no-abbrev');vendor-prefixed\monolog\monolog\src\Monolog\Processor\GitProcessor.php:65
shell_exec$result = explode(' ', trim((string) shell_exec('hg id -nb')));vendor-prefixed\monolog\monolog\src\Monolog\Processor\MercurialProcessor.php:64

Bundled Libraries

PHPMailerGuzzle

Output Escaping

80% escaped15 total outputs
Attack Surface

Send Emails with Resend Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionphpmailer_initsend-emails-with-resend.php:113
actionadmin_menusend-emails-with-resend.php:139
actionadmin_initsend-emails-with-resend.php:200
Maintenance & Trust

Send Emails with Resend Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 9, 2026
PHP min version8.1
Downloads2K

Community Trust

Rating100/100
Number of ratings3
Active installs400
Developer Profile

Send Emails with Resend Developer Profile

CloudCatch

4 plugins · 2K total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Send Emails with Resend

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/send-emails-with-resend/public/success.html

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Send Emails with Resend